The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.
The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.
WHO SHOULD ATTEND?
Information System Owners
System Owner and Managers
Cyber Security Engineers
Module 1 – Introduction to Ethical Hacking
Module 2 – Linux Fundamentals
Module 3 – Protocols
Module 4 - Cryptography
Module 5 - Password Cracking
Module 6 - Malware
Module 7 – Security Devices
Module 8 – Information Gathering - Passive Reconnaissance
Module 9 – Social Engineering
Module 10 – Active Reconnaissance
Module 11 – Vulnerability Assessment
Module 12 – Network Attacks
Module 13 – Hacking Servers
Module 14 – Hacking Web Technologies
Module 15 - Hacking Wireless Technologies
Module 16 – Maintaining Access and Covering Tracks
The Certified Professional Ethical Hacker exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account.